In the last few years there have been a lot of news articles and upsetting stories about companies and their websites ravaged by the ransomware trend. While the tactic isn’t exactly new, this type of encryption-based malware has become an alarmingly popular trend among the hacker communities that target both businesses and private computers. The oh-so-clever idea is not just to do damage like worms that simply delete files or spyware that silently steals data. Instead, hackers stand a chance to directly make a little (or a lot) of cash off their victims by holding their precious files hostage and demanding a crypto-currency ransom. Continue Reading
Human error accounts for 90% of all business data breaches. In study after study, we find that firewalls and monitoring and encryption can only do so much. But 90% of data breaches are primarily caused by employees and sometimes customers getting phished, hacked, and fooled. Verizon’s 2017 Data Breach Investigation Report found this, and Willis Towers Watson consultancy found this by examining insurance claims. A study done by the Kasperky cybersecurity firm found the same result. Every time we study the issue of security breaches, human error and social hacking victims make up 90% of the incidents. Continue Reading
Juice jacking is a serious threat to people going about their normal business and simply trying to charge their devices in any public space. You would never even think it was something that could happen unless you’re looking out for it. Here are some important things you need to know about juice jacking and how it can cause people to damage your devices and steal your personal information. Continue Reading
A personal contact approach is often used when hackers just want you to click the link. Many people don’t think twice about clicking a funny “youtube” link from a friend or relative to lift their spirits at work. But if the email address is unusual, don’t. Besides, why aren’t they sharing it with you on Twitter like usual? Continue Reading
Hackers will do anything to hack your network, steal money, or gain access to sensitive data. Hackers are also incredibly lazy. While they could compete with you in single cybersecurity combat; your firewalls vs their blackhat skills, they’d rathe take the coward’s way and trick an employee into breaching security for them.
This is known as a social engineering hack; When a hacker uses phone, email, or chat to fool an employee into using their own access to expose the network to malware, wire money, or send over sensitive information. The reason it works is beacuse hackers are good at coming up with a con-artists’s line that convinces staff members that they are legitmate despite any warning signs.
The best defense against this type of attack is to know what’s coming. not only that clicking links and doing unconfirmed favors is bad, but the types of lines that hackers use and why they have worked in the past. So let’s dive right into the psychology and methods of the social hacker. Continue Reading
Most phishing email goes after mass targets. It’s not particularly well-crafted, but the senders expect that if they hit enough mailboxes, some victims will open the attachment or visit the malicious website. A growing portion, though, targets specific companies or individuals with carefully crafted messages. It’s called spearphishing. When it’s aimed at high-profile individuals or large assets, it’s also called whaling — going after really big fish. (All right, a whale isn’t really a fish.) Continue Reading
Welcome back to the second half of our two-part series on when and why your business should be using encryption. If you joined us last time, you’ve probably started to realize just how useful encryption is and that it can be applied to anything you’d like to keep safe from hackers, whether or not they make it past your firewall. In the first half, we covered encrypting client payment data at every stage and began to talk about the risk of identity theft if hackers get ahold of either client or employee personal information. Let’s pick back up where we left off at storing personal information once you’ve collected it. Continue Reading